0266ae5f88
Remove the linker's reliance on BSD cruft and use the glibc-style ElfW macro. (Other code too, but the linker contains the majority of the code that needs to work for Elf32 and Elf64.) All platforms need dl_iterate_phdr_static, so it doesn't make sense to have that part of the per-architecture configuration. Bug: 12476126 Change-Id: I1d7f918f1303a392794a6cd8b3512ff56bd6e487
41 lines
1.5 KiB
Makefile
41 lines
1.5 KiB
Makefile
_LIBC_ARCH_COMMON_SRC_FILES := \
|
|
arch-arm/bionic/abort_arm.S \
|
|
arch-arm/bionic/atomics_arm.c \
|
|
arch-arm/bionic/__bionic_clone.S \
|
|
arch-arm/bionic/eabi.c \
|
|
arch-arm/bionic/_exit_with_stack_teardown.S \
|
|
arch-arm/bionic/futex_arm.S \
|
|
arch-arm/bionic/__get_sp.S \
|
|
arch-arm/bionic/libgcc_compat.c \
|
|
arch-arm/bionic/memcmp16.S \
|
|
arch-arm/bionic/memcmp.S \
|
|
arch-arm/bionic/_setjmp.S \
|
|
arch-arm/bionic/setjmp.S \
|
|
arch-arm/bionic/sigsetjmp.S \
|
|
arch-arm/bionic/syscall.S \
|
|
|
|
_LIBC_ARCH_STATIC_SRC_FILES := \
|
|
arch-arm/bionic/exidx_static.c \
|
|
|
|
_LIBC_ARCH_DYNAMIC_SRC_FILES := \
|
|
arch-arm/bionic/exidx_dynamic.c \
|
|
|
|
# Remove the C++ fortify function implementations for which there is an
|
|
# arm assembler version.
|
|
_LIBC_FORTIFY_FILES_TO_REMOVE := \
|
|
bionic/__memcpy_chk.cpp \
|
|
bionic/__memset_chk.cpp \
|
|
bionic/__strcpy_chk.cpp \
|
|
bionic/__strcat_chk.cpp \
|
|
|
|
libc_common_src_files := \
|
|
$(filter-out $(_LIBC_FORTIFY_FILES_TO_REMOVE),$(libc_common_src_files))
|
|
|
|
ifeq ($(strip $(wildcard bionic/libc/arch-arm/$(TARGET_CPU_VARIANT)/$(TARGET_CPU_VARIANT).mk)),)
|
|
$(error "TARGET_CPU_VARIANT not set or set to an unknown value. Possible values are cortex-a7, cortex-a8, cortex-a9, cortex-a15, krait. Use generic for devices that do not have a CPU similar to any of the supported cpu variants.")
|
|
endif
|
|
|
|
_LIBC_ARCH_ADDITIONAL_DEPENDENCIES := \
|
|
$(LOCAL_PATH)/arch-arm/$(TARGET_CPU_VARIANT)/$(TARGET_CPU_VARIANT).mk
|
|
include $(LOCAL_PATH)/arch-arm/$(TARGET_CPU_VARIANT)/$(TARGET_CPU_VARIANT).mk
|